International Journal of Contemporary Security Studies https://aseestant.ceon.rs/index.php/fb_godisnjak <p style="background: white; text-align: justify;"><span style="color: #212529; font-family: Arial, sans-serif;">The International Journal of Contemporary Security Studies (IJCSS) is a double-blind peer-reviewed, open-access, international journal published twice a year. The journal serves as a platform for academics, policymakers, and practitioners to share high-quality research and practical insights on contemporary security issues.</span></p> <p style="background: white; text-align: justify;"><span style="color: #212529; font-family: Arial, sans-serif;">IJCSS explores a broad range of security topics, including but not limited to national security, cyber security, intelligence studies, counterterrorism, organized crime, geopolitical conflicts, hybrid threats, military strategy, crisis and emergency management, critical infrastructure protection, radicalization, border security, international relations, environmental security, fire safety, disaster risk reduction, nuclear, biological, and chemical security threats, transnational organized crime, migration and border control, space security, human security, public safety, and security governance. The journal also examines the intersection of technology, human rights, and security policy in an evolving global landscape.</span></p> <p class="MsoNormal" style="line-height: normal;"><strong><span style="font-family: 'Palatino Linotype', serif;">Aims and Scope</span></strong></p> <p class="MsoNormal" style="text-align: justify; line-height: normal;"><span style="font-family: 'Palatino Linotype', serif;">The journal aims to provide an interdisciplinary platform for&nbsp;<strong>theoretical and empirical research</strong>&nbsp;in security studies. It seeks to facilitate communication between&nbsp;<strong>academics, security practitioners, policymakers, and analysts</strong>, encouraging a deeper understanding of security challenges in a rapidly changing global environment. The International Journal of Contemporary Security Studies (IJCSS) explores a broad range of security-related topics, covering both traditional and emerging security challenges. These include, but are not limited to:</span></p> <ul style="margin-top: 0cm;" type="disc"> <li class="MsoNormal" style="margin-bottom: 0cm; line-height: normal;"><strong><span style="font-family: 'Palatino Linotype', serif;">National security and defense policies</span></strong></li> <li class="MsoNormal" style="margin-bottom: 0cm; line-height: normal;"><strong><span style="font-family: 'Palatino Linotype', serif;">Cyber security, digital warfare, and information security</span></strong></li> <li class="MsoNormal" style="margin-bottom: 0cm; line-height: normal;"><strong><span style="font-family: 'Palatino Linotype', serif;">Intelligence studies, surveillance, and strategic analysis</span></strong></li> <li class="MsoNormal" style="margin-bottom: 0cm; line-height: normal;"><strong><span style="font-family: 'Palatino Linotype', serif;">Counterterrorism, violent extremism, and deradicalization strategies</span></strong></li> <li class="MsoNormal" style="margin-bottom: 0cm; line-height: normal;"><strong><span style="font-family: 'Palatino Linotype', serif;">Transnational organized crime, human trafficking, and illicit networks</span></strong></li> <li class="MsoNormal" style="margin-bottom: 0cm; line-height: normal;"><strong><span style="font-family: 'Palatino Linotype', serif;">Geopolitical conflicts, hybrid warfare, and asymmetric threats</span></strong></li> <li class="MsoNormal" style="margin-bottom: 0cm; line-height: normal;"><strong><span style="font-family: 'Palatino Linotype', serif;">Military strategy, defense technologies, and arms control</span></strong></li> <li class="MsoNormal" style="margin-bottom: 0cm; line-height: normal;"><strong><span style="font-family: 'Palatino Linotype', serif;">Crisis and emergency management, disaster risk reduction, and humanitarian response</span></strong></li> <li class="MsoNormal" style="margin-bottom: 0cm; line-height: normal;"><strong><span style="font-family: 'Palatino Linotype', serif;">Critical infrastructure protection and resilience planning</span></strong></li> <li class="MsoNormal" style="margin-bottom: 0cm; line-height: normal;"><strong><span style="font-family: 'Palatino Linotype', serif;">Environmental security, climate change, and resource conflicts</span></strong></li> <li class="MsoNormal" style="margin-bottom: 0cm; line-height: normal;"><strong><span style="font-family: 'Palatino Linotype', serif;">Fire safety, risk assessment, and emergency response strategies</span></strong></li> <li class="MsoNormal" style="margin-bottom: 0cm; line-height: normal;"><strong><span style="font-family: 'Palatino Linotype', serif;">Nuclear, biological, and chemical security threats</span></strong></li> <li class="MsoNormal" style="margin-bottom: 0cm; line-height: normal;"><strong><span style="font-family: 'Palatino Linotype', serif;">Border security, migration policies, and cross-border crime</span></strong></li> <li class="MsoNormal" style="margin-bottom: 0cm; line-height: normal;"><strong><span style="font-family: 'Palatino Linotype', serif;">Public safety, urban security, and law enforcement strategies</span></strong></li> <li class="MsoNormal" style="margin-bottom: 0cm; line-height: normal;"><strong><span style="font-family: 'Palatino Linotype', serif;">Human security, human rights protection, and ethical challenges in security studies</span></strong></li> <li class="MsoNormal" style="margin-bottom: 0cm; line-height: normal;"><strong><span style="font-family: 'Palatino Linotype', serif;">Security governance, policy-making, and legal frameworks</span></strong></li> <li class="MsoNormal" style="margin-bottom: 0cm; line-height: normal;"><strong><span style="font-family: 'Palatino Linotype', serif;">Space security and emerging threats in outer space operations</span></strong></li> </ul> <p class="MsoNormal" style="line-height: normal;"><span style="font-family: 'Palatino Linotype', serif;">IJCSS aims to provide a multidisciplinary platform that facilitates dialogue between academics, practitioners, policymakers, and analysts to enhance global security, stability, and resilience in an increasingly complex and interconnected world. The journal promotes collaboration between different disciplines to develop comprehensive security solutions and enhance global stability and resilience.</span></p> <p class="MsoNormal" style="line-height: normal;"><strong><span lang="EN-US" style="font-family: 'Palatino Linotype', serif;">Editor-in-Chief</span></strong><span lang="EN-US" style="font-family: 'Palatino Linotype', serif;"><br /><strong>Prof. Dr. Vladimir M. Cvetković</strong><br /><strong>University of Belgrade, Faculty of Security Studies, Belgrade, Serbia.</strong></span></p> Faculty of Security Studies, University of Belgrade en-US International Journal of Contemporary Security Studies 3009-3759 Remilitarization and the Struggle for an Economic еxploatation of Arctic as a Reflection of War in Ukraine https://aseestant.ceon.rs/index.php/fb_godisnjak/article/view/53478 <p class="MsoNormal" style="margin-bottom: .0001pt; text-align: justify; line-height: normal;"><em style="mso-bidi-font-style: normal;"><span lang="sr-Latn-BA" style="font-size: 10.0pt; font-family: 'Times New Roman',serif; mso-ansi-language: #181A;">Main goal of the paper is to analyze some of the most important implications of the contemporary international relations to the security of Arctic region. As a reflexion of the current state of the international relations and the revitalization of the &bdquo;Cold war&ldquo; interactions among key global players, Arctic region has been subject of relatively intensive (re)militarization from both &ndash; Russian and &bdquo;Western&ldquo; &ndash; sides, as well as of military reconfiguration, in a sense that NATO, through the admission of Finland and Sweden in its membership in April 2023 and March 2024, significantly strenghtened its Baltic, Nordic and Arctic flanks, as well as its presence at the Russian border. The analysis of the subject has been done within the theoretical framework of the science of international relations and by using the selected scientific methods, such as content analysis, inductive and deductive methods, as well as the comparative analysis. One of the conclusions of the analysis is that, as an implicitaion of its (re)militarization, military reconfiguration and of the state of contemporary international relations in general, military security of the Arctic region is by far predominant dimension of its security at the moment. Additional complicating moment regarding the complex situation in the Arctic comes with the &bdquo;Chinese factor&ldquo; and the strong intention of Beijing, primarily over Moscow, to gradually impose itself as a inevitable political, economic, as well as security &bdquo;force&ldquo; in the Arctic region. Western countries, led by the US, the intention of China see as a direct threat to their national interests, while the Russian Federation`s long term best interests, no matter how important its partnership with Beijing is right now, is to keep its presence and influence in the region within the acceptable framework. </span></em></p> Boris Tučić Copyright (c) 2024 Contemporary Security Studies 2024-12-04 2024-12-04 2 2 The U.S. Role and Policies in International Peacekeeping Operations and Peace Building: Potential Engagement with the South Caucasus https://aseestant.ceon.rs/index.php/fb_godisnjak/article/view/54275 <p><span lang="EN-US" style="font-size: 12.0pt; line-height: 115%; font-family: 'Times New Roman',serif; mso-fareast-font-family: Aptos; mso-fareast-theme-font: minor-latin; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;">The paper is discussing the potential US peace-keeping engagement with the South Caucasus after the Third Nagorno-Karabakh war. Based on the case-study of the Third Nagorno-Karabakh war, followed by ethnic cleaning of the Armenians of Nagorno-Karabakh and continuous Azerbaijani aggression towards the sovereign territory of the Republic of Armenia, the paper analyzes the US interests and draws potential scenarios for US peacekeeping engagement in Armenia-Azerbaijani conflict. It draws five potential scenarios, which are: direct military engagement, support to a UN (or other international organization, for instance, OSCE) mission, support to the EU mission in Armenia, NATO engagement, distancing, and argues that the most realistic model is the US direct diplomatic engagement with major support to the EU/EU countries&rsquo; efforts, including military, in Armenia.</span></p> Ruben Elamiryan Copyright (c) 2024 Contemporary Security Studies 2024-12-04 2024-12-04 2 2 Cyberattacks on the Financial Sector of Critical Infrastructure https://aseestant.ceon.rs/index.php/fb_godisnjak/article/view/54498 <p class="MsoNormal" style="text-align: justify; line-height: normal;"><span style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"><br />The financial sector of critical infrastructure represents one of the most vulnerable sectors when it comes to cyber attacks, due to its crucial role in the global economy and the nature of business today. The digitalization of finance opens the door to cyber attacks through the wide and pervasive availability of financial services on modern technologies and networks. This paper explores protective measures against cyber attacks in the financial sector by analyzing three significant incidents: the attack on the Central Bank of Bangladesh, the data breach at Capital One, and the ransomware attack on Travelex, a money transfer company. The primary aim of the research is to analyze the impact of cyber attacks on the financial sector of critical infrastructure and to identify effective protective measures that can reduce the risk of similar attacks in the future. By utilizing a review of international literature and case studies, the paper emphasizes the importance of integrating technological and organizational measures, as well as the significance of building cyber resilience through continuous improvement of security protocols and a culture of cyber awareness. The research findings indicate that while cyber attacks pose significant risks, they can also drive financial institutions toward innovation and enhancement of protective measures.</span></p> Jovana Brajovic Copyright (c) 2024 Contemporary Security Studies 2024-12-04 2024-12-04 2 2 Possible Solutions for Cyberbullying https://aseestant.ceon.rs/index.php/fb_godisnjak/article/view/51497 <p class="MsoNormal" style="margin-bottom: 0cm; text-align: justify; text-indent: 36.0pt; line-height: normal;"><span style="font-size: 12.0pt; font-family: 'Times New Roman',serif;">The paper presents potential solutions for cyber violence, that is, the solutions for different forms of violence that are manifested in the cyber space. The paper begins with an overview of the theoretical framework, key features of cyberbullying and the roles that people can play in it. In this context, the paper points out the specifics of cyberbullying compared to the traditional bullying, while pointing out the relevant characteristics of the cyber space itself. Based on the consideration of the harmful consequences of cyberbullying, the paper points out the considerable danger of this phenomenon, and consequently, the necessity of its adequate suppression and prevention. In this regard, the paper will present possible solutions for cyber violence related to the application of modern technologies in cyber space. In particular, the paper discusses the importance of utilising information technologies in the fight against cyberbullying, through consideration of their application in the detection of cyberbullying based on the analysis of textual and other content. The capabilities of artificial intelligence and its related fields, that is, technologies that are applied in the suppression of cyber violence will be illustrated through specific projects and models developed for these purposes, which are also applied in cases of peer cyber violence. The paper also examines the possible ways of using certain technologies for providing support to victims of cyber violence.</span></p> Tatjana Petrović Copyright (c) 2024 Contemporary Security Studies 2024-12-04 2024-12-04 2 2 Implementation od preventive measures for reducing the fire risks in UHMC ,,Dr Dragisa Misovic - Dedinje" https://aseestant.ceon.rs/index.php/fb_godisnjak/article/view/53914 <p class="MsoNormal" style="margin: 0cm; text-indent: 36pt; line-height: normal; font-size: 11pt; font-family: Calibri, sans-serif; text-align: justify;"><span lang="SR-CYRL-RS" style="font-size: 12pt; font-family: 'Times New Roman', serif;">Fire have a great potential to threaten people's lives, property, material goods, and the environment, and turn into disasters. The danger of fire, i.e. the risk to people and property, increases especially in public buildings, in which, as a rule, a large number of people are staying at the same time.</span></p> <p class="MsoNormal" style="margin: 0cm; text-indent: 36pt; line-height: normal; font-size: 11pt; font-family: Calibri, sans-serif; text-align: justify;"><span lang="SR-CYRL-RS" style="font-size: 12pt; font-family: 'Times New Roman', serif;">Numerous experiences have shown that a large number of fires could have been prevented or extinguished at the initial stage, by observing and applying basic fire protection measures.</span> <span lang="SR-CYRL-RS" style="font-size: 12pt; font-family: 'Times New Roman', serif;">Е</span><span lang="EN" style="font-size: 12pt; font-family: 'Times New Roman', serif;">arlier approach to fire protection was based on measures aimed </span><span lang="SR-LATN-RS" style="font-size: 12pt; font-family: 'Times New Roman', serif;">to</span><span lang="EN" style="font-size: 12pt; font-family: 'Times New Roman', serif;"> suppress the fire and reduce its consequences, when the fire had already started. The contemporary concept of fire risk reduction involves planning and implementing a series of preventive measures. Preventive measures are the only effective and economical way to protect against fire, and they affect both the prevention of fire occurrence and the significant reduction of negative effects, if a fire occur.</span></p> Jovana Nikolic Copyright (c) 2024 Contemporary Security Studies 2024-12-04 2024-12-04 2 2 Civil protection and the risk of the use of weapons of mass destruction: actualization of the use of dual-purpose shelters in Serbia https://aseestant.ceon.rs/index.php/fb_godisnjak/article/view/55169 <p>The special military operation that the Russian Federation launched on the territory of Ukraine on February 24, 2022, brings with it a number of problematic issues not only from the domain of military sciences but now increasingly specific security sciences (energy security, environmental security, food security, health security).</p> Milos Tomic Copyright (c) 2024 Contemporary Security Studies 2024-12-04 2024-12-04 2 2 The Return of Mandatory Military Conscription https://aseestant.ceon.rs/index.php/fb_godisnjak/article/view/55170 <p>&nbsp;</p> <p class="MsoNormal" style="text-align: justify;"><span style="font-size: 12.0pt; line-height: 115%; font-family: 'Times New Roman','serif';">Традиција служења обавезног војног рока у Србији свој заметак налази у периоду друге половине 19. века. Стицање независности Кнежевине Србије на Берлинском конгресу утрло је пут развоја народне стајаће војске 1883. године. Тиме је и српска држава кренула стопама великих сила Европе 19. века, које су увеле народне стајаће војске. Увођење обавезног војног рока било је подстакнуто растућим националним заносом, како у случају великих сила, тако и у случају Србије. Народна стајаћа војска постала је симбол државности и независности Србије, и израз њене вишевековне борбе за слободу. Следствено томе, служење војног рока је представљало праксу која је имала далекосежне ефекте, његова функција надилазила је просту војну обуку. Специфичан израз служења војног рока било је јачање националне свести и особеног етоса српског народа. </span></p> Dušan B. Kesić Copyright (c) 2024 Contemporary Security Studies 2024-12-04 2024-12-04 2 2 Book review: PROTECTION OF CRITICAL INFRASTRUCTURE AS A CONDITION FOR THE PRESERVATION OF LIFE AND THE SURVIVAL OF SOCIETY https://aseestant.ceon.rs/index.php/fb_godisnjak/article/view/53752 <p>/</p> Jana Marković Copyright (c) 2024 Contemporary Security Studies 2024-10-23 2024-10-23 2 2